Monday, October 30, 2006

Email Thanking For Interview

The door to the dark side of the windows Windows

who never goes out ... except by choice or "accident" applications, I mean (hehe). Well, I'll go to the point, not before, as usual prevent: SHORT POINT FOR IMPORTANT QUESTION AND ITS ANSWER:


Question .- I can screw up stuff in it? Answer .- Yes

And that what was said, went on to propose a simple exercise for the more adventurous newcomers get in danger the health of your computer ... Open


Windows registry and look for this key
 


HKEY_CURRENT_USER \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer

(D. Micro $ oft reserves the right to call his keys as he wants in the different versions of their products, I notice.)

The fun begins when, under it, you create a value called NoClose


type DWORD (REG_DWORD) , which will give value 1 if you want to disable the Shut Down command

, or 0 (zero) if you re-enable it. Yes, you read that right: these values \u200b\u200bare used to enable or disable
option System Shutdown.
Of course, the fun increases when, instead of the previous key, use this:

HKEY_LOCAL_MACHINE \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Policies \\ Explorer With the first we are preventing the user that we have entered into the system to switch off, but the latter is what we prevent all the users. But what is the reason for the existence of this variable in the always surprising and largely unknown


Windows registry? There are several theories.

data
A first theory originated in the days when John F. Hopkins, an employee of the company, every day off your computer and ran, as led by the devil himself, to arrive in time to take the bus that took him to the small village where he lived, about 50 miles from their workplace. Colleagues "Developers Team" decided that it might be funny, when leaving, John had some unforeseen difficulties which delayed. We've all seen the Internet video in which John, in his cubicle, smash the computer to see despair, one day more, that the option to Shut Down has "disappeared." So many were the laughs that what they were made, their charm and wit that variable companions decided to stay there forever.
Another theory suggests that it was the President himself U.S. who suggested that it would be interesting to introduce this type of difficulty in operating systems. Was achieved in this way, the interns often borrowed his superiors for help, encouraging beneficial as vertical communication in organizations. And

where employer does not send sailor was said and done.


But the more popular theory is based on conjecture

Nobitch-Hellman , that there computer (at least one) whose mental age is bounded below by the so-called teen-age (also called the awkward age or, more recently, the chicken)

. To prove this theory, an immediate corollary would be that there are certain elements
computer databases or applications with serious and

morally and intellectually acceptable. Aligning with this line of argument, some suggest the following example. There

environments where it is undesirable that the machine can be turned off by any user, such as those in which you are running security software or control that should be permanently

active. Sea, for example, the case of a digital recorder . A digital recorder is, in essence (

often do much more
), a collecting images programilla a camera (security) and saves. It is clear that if the computer we have one of these, do NOT agree that any user can shut us, because if we stop him we were no cameras, and this is NOT good.

Of course, if we want to prevent any user we can turn off the computer , the first thing we should try to do is restrict access to the off switch, power cable, motherboard and all that nonsense with which so easily can make the ordenata then poof! That is, in our example let the ranger's hut (security office fine sites) monitor, keyboard and mouse as much. The rest will be on the other side of any wall in any room of greater security and more restricted access.


But is that enough? Well of course not: we have not blocked access to the registry, or the command line, or ... Anyway, if you like games of attacker and defender, here's a pretty cool. When you think you have everything well tied down (if you do as a defender), you only miss a good attacker. If you want to save the Styes that would cost you a fee, you very well apañártelas Aragonese looking for a network, the habemos in abundance. Choose a computer to know: what will distinguish the Cachirulo black with the skull (optional) and because the keys pressed loose. Put it in front of your computer and espétale good stiff, hands on her hips: Á-WHY-no-Ma-Pa-GAS-e-Lor-DE-NA-DOR!

(As is well known, the hands always accentuate the syllables, but especially when we challenge something.)

Do you like ... computing?

Do you like ... compete?


Luck to the hand, then!

Tuesday, October 24, 2006

Epsom Salts And Hair Loss

MacLeod, The unquenchable

on the screen of my computer is it: Google, Great Search. Front to him, staring at him, that's me: a seasoned internautical machine with hundreds or thousands or millions of hours of computer experience, which everyone calls a MH (Very Hacker). I have to look for the story to my nephews. Google searches are no secrets for me, but I'm rather flojillo stories. I know that I'm looking for is titled "Nosecuantos Blancaleches and Dwarfs." I do not remember exactly how many were the bloody gnomes, or how exactly the whore called (pardon me). What would a layman with this data? Look for "dwarfs", which is the only term insurance leads. A's see ...




Dwarfs



Result (check it out!): Too many dwarfs. Well, here I go, the animal computer. Let's try the name, which certainly do better. What do I do when I find on my machine a file whose name begins with "White" I do not know how it ends? Search for "White *"! Yast, since Google will be the same, di-go-yo. So try it ...

White *


Result: Uh, oh, for the little king of computers seems to have fallen upside down ...! turns out that Google does not support "stemming" which what we call the MH to the ability to use a wildcard instead of part of a term in a search. Are we lost? "We have no choice but to dive into the maelstrom of dwarfs that offers the first search?


Tachánnnnn, tachínnnnnn, pi-pi-pi (tune of tension


great crescendo of scary movies)

Noooo, tranquiii ... Google supports asterisks as part of a consultation, but the meaning assigned to them is not part of a word, but of a whole word. That is, if we seek "the * red" get all pages that contain "red boxes," the Red Shoes, "" red berries "...

So if we know who are" the Nosecuantos Dwarfs ", even without knowing exactly how many, we can see:


" the * Dwarfs


Thus so simple, we have refined our search, obtaining results incomparably better than the first query: the first results obtained from the references to "Snow White

and

seven dwarfs" they were looking for.

Try applying this technique to our old problem of "
Among nosedonde and Valdemoro

"

"between * and Valdemoro"

Pinto! :)


Oh, and we have several words undefined in the same query! That is, we can substitute an asterisk all the words of a sentence to doubt "correct." So, if you do not remember exactly what it was that said that the Greek had no destination, we find:


"The 'no destination"

vulgar spirits!

vulgar spirits have no
destination, according to Plato

.